Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:00
Behavioral task
behavioral1
Sample
93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe
-
Size
192KB
-
MD5
93f4ddd3de67f16e70a18ccbda05d2a5
-
SHA1
78c718eb60f8b2bc3c28ccd43c349f67e09df0c0
-
SHA256
4de50d4974d2ef6822389a2308db41ced1c1f74e36bcd403cb1120b0d2043653
-
SHA512
46cfff027491b8f4b76b7e3800c983e9bf9b394bf212664ac92a899574e76bdb84240c5ab6b96156cfe417c98d7d97157b0190e35e7a3b250d66a3d4c173c46d
-
SSDEEP
6144:KS2Cx6i+qf/m1utUoaW/N6OZrrjGU12ifmo:Kyj+qfuAVNXp12Ym
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4308-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4308-2-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\kanki\svchostt._3 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._6 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._7 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\crls\crls.exe 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._1 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._2 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._4 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._5 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt._8 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe File created C:\Windows\SysWOW64\kanki\svchostt.exe 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93f4ddd3de67f16e70a18ccbda05d2a5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4308